Results 211 to 220 of about 121,764 (250)
Some of the next articles are maybe not open access.
Threshold Ring Signature Scheme from Cryptographic Group Action
Lecture Notes in Computer Science, 2023A threshold ring signature (t-out-of-N) is an extension of ring signatures that allow t users jointly sign a message on the behalf of N users, selected in an arbitrary manner, while keeping their identities anonymous. This paper presents a construction of threshold ring signature from cryptographic group action, based on the OR proof of group action ...
Pham, Minh Thuy Truc +3 more
openaire +4 more sources
Subliminal channels in the identity-based threshold ring signature
International Journal of Computer Mathematics, 2009Subliminal signature schemes enable senders to hide subliminal messages in a digital signature such that no one besides the authorised subliminal message receiver (called designated receiver) can extract subliminal messages from that signature. This paper is the first to construct subliminal channels on the identity-based threshold ring signature ...
Chao-Lin Yang +2 more
openaire +3 more sources
Confessible Threshold Ring Signatures
2006 International Conference on Systems and Networks Communications (ICSNC'06), 2006We present two threshold ring signature schemes with different properties. One focuses on the confessibility (or signer verifiability) and the denouncibility properties. The other focuses on the threshold-confessibility. Our schemes are built on generic ring signature schemes and can be easily adapted to most existing ring signature schemes.
Yu-shian Chen +3 more
openaire +1 more source
Identity Based Threshold Ring Signature
2005In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n – t entities to generate a publicly verifiable t-out-of-n signature on behalf of the whole group, yet the actual signers remain anonymous. The spontaneity of these schemes is desirable for ad-hoc groups such as mobile ad-hoc networks.
Yiu, SM, Chow, SSM, Hui, LCK
openaire +2 more sources
Efficient ID-based Threshold Ring Signature scheme
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2008Threshold ring signature enables any group of t entities spontaneously conscripting arbitrary n-t entities to generate a publicly verifiable t-out-of-n threshold signature on behalf of the whole group of the n entities, while the actual signers remain anonymous.
Jiang Han, Xu QiuLiang, Chen Guohua
openaire +1 more source
Count Me In! Extendability for Threshold Ring Signatures
2022Ring signatures enable a signer to sign a message on behalf of a group anonymously, without revealing her identity. Similarly, threshold ring signatures allow several signers to sign the same message on behalf of a group; while the combined signature reveals that some threshold t of the group members signed the message, it does not leak anything else ...
Aranha, Diego F. +4 more
openaire +3 more sources
Threshold Discernible Ring Signatures
2012A ring signature [1] demonstrates that the signer who produced it is among a group A of n people, called a ring. A signer may produce a ring signature on any ring A he is part of, arbitrarily without any setup procedure or the consent of anyone in A. Several extensions of ring signatures have been proposed in literature.
Swarun Kumar +4 more
openaire +1 more source
Separable Linkable Threshold Ring Signatures
2004A ring signature scheme is a group signature scheme with no group manager to setup a group or revoke a signer. A linkable ring signature, introduced by Liu, et al. [20], additionally allows anyone to determine if two ring signatures are signed by the same group member (a.k.a. they are linked). In this paper, we present the first separable linkable ring
Patrick P. Tsang +5 more
openaire +1 more source
Identity-based threshold ring signature without pairings
2008 International Conference on Communications, Circuits and Systems, 2008Identity-based(ID-based) threshold ring signature has rapidly emerged in recent years and many schemes have been proposed until now. However, most of these ID-based threshold ring signatures are constructed from bilinear pairings, a powerful but computationally expensive primitive.
null Xiong Hu +3 more
openaire +1 more source
Improved Lattice-Based Threshold Ring Signature Scheme
2013We present in this paper an improvement of the lattice-based threshold ring signature proposed by Cayrel, Lindner, Ruckert and Silva (CLRS) [LATINCRYPT ’10]. We generalize the same identification scheme CLRS to obtain a more efficient threshold ring signature. The security of our scheme relies on standard lattice problems.
Slim Bettaieb, Julien Schrek
openaire +1 more source

